US20130160090A1 - Communications methods and appliances - Google Patents
Communications methods and appliances Download PDFInfo
- Publication number
- US20130160090A1 US20130160090A1 US13/762,187 US201313762187A US2013160090A1 US 20130160090 A1 US20130160090 A1 US 20130160090A1 US 201313762187 A US201313762187 A US 201313762187A US 2013160090 A1 US2013160090 A1 US 2013160090A1
- Authority
- US
- United States
- Prior art keywords
- appliance
- communications
- electronic address
- processor
- verification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 158
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000012795 verification Methods 0.000 claims description 40
- 238000004519 manufacturing process Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 description 12
- 238000003860 storage Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000009826 distribution Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- aspects of the disclosure relate to communications methods and appliances.
- printers In the case of printers, a common approach (seen in many offices) has been to post a label of the printer name with its network address. In this manner, if an individual trusts the label, they could use that address to send a print job to the intended printer. Similar techniques are used for scanners, disk-drives, spoolers and other such appliances.
- IP-Sec IP Security Protocol
- IP-Sec IP Security Protocol
- An approach to certifying the destination has been to use a challenge in the initial message from the client to the target.
- the challenge is encrypted with a shared secret or other keying mechanism and only the rightful recipient should be able to answer the challenge and thereby affirm the identity.
- the issue here is one of key distribution. If the key is shared across a family of appliances, than the imposter can redirect the print job to a second printer and intercept the material. If the key is particular to a printer, then discovering that key is an issue and similar to discovering the printer's IP address noted above.
- At least some aspects of this disclosure are related to improved apparatus and methods for implementing electronic communications between electronic devices such as an appliance and a client in one embodiment.
- communications methods and appliances are described.
- a communications method comprises prior to deployment of an appliance, establishing a trusted association between the appliance and a certificate authority, during deployment of the appliance, associating the appliance with a communications address of a communications medium, using the certificate authority, creating a signed certificate including the communications address of the appliance, announcing the signed certificate using the appliance, after the announcing, extracting the communications address of the appliance from the signed certificate, and verifying the communications address of the appliance.
- an appliance comprises a communications interface configured to implement communications of the appliance with respect to a client via a communications medium after deployment of the appliance with respect to the communications medium, wherein the appliance is associated with a communications address of the communications medium upon deployment of the appliance and wherein a trusted association is established between a certificate authority and the appliance prior to deployment of the appliance, and processing circuitry coupled with the communications interface and wherein the processing circuitry is configured to access the communications address, to initiate creation of a signed certificate using the certificate authority and which includes the communications address, and to initiate announcement of the signed certificate including the communications address for use in verification of the communications address of the appliance.
- FIG. 1 is a functional block diagram of a communications system according to one embodiment.
- FIG. 2 is a functional block diagram of an electronic device appliance according to one embodiment.
- FIG. 3 is a flow chart illustrating an exemplary method for providing a signed certificate according to one embodiment.
- FIG. 4 is a flow chart illustrating an exemplary method for implementing communications according to one embodiment.
- FIG. 1 an exemplary configuration of a communications system 10 is shown. Additional embodiments and aspects are described in a co-pending application entitled “Electronic Device Communication Methods, Appliance Verification Methods, Appliance Programming Methods, Appliances, Articles Of Manufacture, And Client Electronic Devices,” listing Rajesh Krishna Shenoy as inventor, filed the same day as the present application, having attorney docket no. 200312922-1, the teachings of which are incorporated herein by reference.
- Communications system 10 may include one or more electronic device clients (i.e., clients) 12 , one or more electronic device appliances (i.e., appliances) 14 , one or more external communications device 15 , and communications media 16 .
- communications system 10 is embodied as a networked arrangement of clients 12 configured to use the resources of appliances 14 .
- Exemplary clients 12 include personal computers, workstations, and other electronic devices configured to implement electronic communications with respect to appliances 14 or other devices.
- Exemplary appliances 14 may have resources which may be accessed and used by clients 12 and may be embodied as printers, multi-functional peripherals, facsimile machines, scanners, copiers, disk drives, spoolers' or other configurations accessible by clients 12 .
- appliances 14 may comprise user-accessible devices which are configured to interact with a user during normal operation such as providing data to a user (e.g., provide printed media, copying media, displaying data, capturing data such as images, etc.).
- exemplary users may include lay (i.e., non-technical) people as opposed to IT personnel.
- Communications media 16 includes one or more communications medium configured to communicate data intermediate clients 12 and appliances 14 of communications system 10 .
- one or more communications medium may comprise a communications network which may be embodied as a private and/or public network and may utilize packet-switched TCP/IP communications in one implementation.
- communications networks include a zero-configuration network, UPnP based network or an IT-administrated network.
- a network may include a plurality of nodes such as switches, routers or other devices (i.e., devices not typically accessed by the exemplary above-defined users during normal operations) capable of receiving electronic communications and forwarding the electronic communications to appropriate recipients.
- Individual ones of clients 12 and appliances 14 and other electronic devices configured to communicate using communications media 16 may be individually considered to be associated with communications media 16 and may have a respective unique communications address identifying the association and usable by communications media 16 and communicating devices to direct communications to appropriate recipients as well as identify a respective sending device of communications.
- another communications medium 17 may be configured to initiate verification operations of a client 12 and/or an appliance 14 as described further below.
- communications device 15 is configured to utilize a communications medium 17 (e.g., electromagnetic energy) to implement communications external of communications media 16 in one embodiment.
- Communications device 15 and one or more client 12 and/or appliance 14 may be configured to communicate with one another apart from communications media 16 .
- Communications medium 17 includes any appropriate configuration and may provide wired and/or wireless communications.
- verification operations may be initiated using communications of media 16 .
- an exemplary configuration of an appliance 14 is shown.
- the depicted appliance 14 includes a communications interface 20 , processing circuitry 22 , storage circuitry 24 and a user interface 26 .
- Other circuitry or components may be provided in other embodiments and corresponding to the respective implementation or configuration of appliance 14 (e.g., appliance 14 may include a print engine in a printer configuration).
- individual clients 12 may be similarly configured as appliance 14 in one arrangement and may individually include a communications interface, processing circuitry, storage circuitry and a user interface as well as any additional components or circuitry applicable to the respective implementation of client 12 .
- Storage circuitry 24 is configured to store electronic data and/or programming such as executable instructions (e.g., software and/or firmware), data, or other digital information and may include processor-usable media.
- Processor-usable media includes any article of manufacture which can contain, store, or maintain programming, data and/or digital information for use by or in connection with an instruction execution system including processing circuitry in the exemplary embodiment.
- exemplary processor-usable media may include any one of physical media such as electronic, magnetic, optical, electromagnetic, infrared or semiconductor media.
- processor-usable media include, but are not limited to, a portable magnetic computer diskette, such as a floppy diskette, zip disk, hard drive, random access memory, read only memory, flash memory, cache memory, and/or other configurations capable of storing programming, data, or other digital information.
- storage circuitry 24 may be configured to store certificates, keys (e.g., public and private) and other desired information.
- User interface 26 may include a display configured to depict information to a user as well as a keyboard or other input device configured to receive input from a user.
- At least some aspects described herein are directed towards implementing communications of increased security intermediate plural devices such as clients 12 and appliances 14 .
- exemplary aspects provide verification operations which enable an appropriate client 12 to certify the provenance or authenticity of a communications address of a respective appliance 14 .
- an individual appliance 14 may be associated, with a certificate authority (CA).
- CA certificate authority
- a trusted association is established between the appliance 14 and the certificate authority to provide verification operations, such as certification of the provenance of the communications address of the appliance 14 , at a later moment in time.
- the trusted association may be established via a unique secret (e.g., prime number) shared between the appliance 14 and the certificate authority in one arrangement.
- the certificate authority may be physically associated with appliance 14 (e.g., embodied or embedded internally of appliance 14 as mentioned above) to establish the trusted relationship, or the trusted relationship may be provided in any other appropriate manner.
- a source (e.g., manufacturer) of appliances 14 may have a trusted relationship with a certificate authority and through the relationship the source is able to produce serial numbers of individual appliances 14 which illustrate that the respective appliances 14 were trusted by the source and the source was trusted by the certificate authority (i.e., appliances 14 were authentically manufactured by the source also referred to as non-repudiation).
- an appliance 14 may be deployed for operation. For example, during deployment, an appliance 14 may be associated with communications medium 16 to interact with clients 12 and perhaps other appliances 14 . During the association, a communications address of the communications medium 16 may be assigned to the respective appliance 14 . Thereafter, communications may be implemented between the appliance 14 and communications medium 16 using the communications address. Exemplary aspects are described below enabling the certification of the provenance of the communications address of the appliance 14 to provide communications intermediate clients 12 and the appliance 14 . According to some aspects, a plurality of communications addresses may be associated with an individual appliance 14 . For example, the addresses may be respectively used at appropriate moments in time (e.g., communications occur inside or outside of a firewall, etc.). The plurality of communications addresses may be provided within a signed certificate for announcement by appliance 14 described further below.
- the certificate authority may create a signed certificate which includes the communications address(es) associated with the appliance 14 . After creation, the signed certificate may be stored internally of the respective appliance 14 in one embodiment.
- Appliances 14 individually make their respective communications addresses available to clients 12 and perhaps other devices of the communications system 10 using respective signed certificates according to some aspects. Appliances 14 may announce respective signed certificates responsive to detection of an action such as one or more triggering event.
- external communications device 15 may be configured to initiate verification operations performed by one or more appliance 14 to provide the triggering event.
- device 15 may emit an external communication (e.g., according to a Bluetooth protocol) which when received by an appliance 14 initiates the receiving appliance 14 to output the signed certificate which may be utilized to certify the provenance of the communications address of the appliance 14 as described in further detail below.
- client 12 , appliance 14 and/or communications device 15 may provide proximity reader communications to initiate the communications of the signed certificate.
- communications from external communications device 15 to initiate verification operations may be communicated using communications media 16 .
- a user may access a user input of user interface 26 at an appropriate moment in time to initiate the outputting of the signed certificate from the appliance 14 .
- processing circuitry 22 of appliance 14 may monitor time intervals and initiate the communication of the signed certificate following the detection of an action including an elapse of a predetermined period of time (e.g., to provide periodic communications of the signed certificate). Other triggering events may be used in other aspects.
- appliances 14 announce the signed certificates including outputting internally stored signed certificates.
- announcement of the signed certificates may be independently initiated by appliances 14 or responsive to external stimulus.
- appliances 14 may encode or encrypt signed certificates prior to announcement of the certificates for subsequent decoding or decryption by clients 12 .
- communications media 16 may comprise a first communications medium for communications of data content and a second communications medium for communications of the signed certificates.
- a medium comprising a networking protocol may be used for communicating the signed certificates wherein the certificates can individually be sent to multiple participants (e.g., clients 12 ) during a single announcement.
- Clients 12 may listen on the medium comprising a multicast channel for the signed certificates according to the presently described example and thereafter utilize the first communications medium to provide communications of data content if the provenance of the communications address of the respective appliance 14 is certified.
- Clients 12 may access the announced signed certificates to certify the provenance of the communications addresses of the appliances 14 .
- clients 12 are individually configured to search for the presence of the announced signed certificates.
- the announcements may individually include an appropriate identifier which indicates to clients 12 that a signed certificate is contained therein.
- Other embodiments are possible to provide for the communication of the signed certificates from appliances 14 to clients 12 .
- Clients 12 receiving signed certificates are arranged to verify verification information (e.g., communications address of appliance(s) 14 ) contained therein.
- verification information e.g., communications address of appliance(s) 14
- clients 12 verify the signed certificates themselves and thereafter verify the communications address(es) contained within the signed certificate(s).
- clients 12 identify the signing entities of the source certificates (e.g., the respective certificate authorities).
- the respective appliances 14 may be verified as authentic if the signing entities of the signed certificates are proper (e.g., proper certificate authorities). Provenances of the communications addresses from selected ones of the appliances 14 may be rejected if the respective signing entities of the certificates are not proper.
- clients 12 extract communications addresses from the signed certificates.
- the clients 12 may also access information regarding respective sender addresses regarding the entities which announced the signed certificates (i.e., appliances 14 ).
- clients 12 are configured to compare the communications addresses extracted from the signed certificates with respective ones of the sender addresses order to certify the provenances of the respective communications addresses. If verification is proper, clients 12 may implement communications with respect to verified ones of the appliances 14 . If verification is not proper (e.g., certificates or signing entities not proper, or addresses do not match), clients 12 may disable any communications with respect to the appliances 14 and may also inform a network administrator or other appropriate personnel.
- a client 12 may create a session key and encode (e.g., encrypt) data content to be communicated (e.g., print job) using the session key.
- a client 12 may encrypt the session key with an appliance public key received in a signed certificate, attach the encrypted session key to the beginning of an encrypted message including data content, and communicate the encrypted message to appliance 14 .
- clients 12 and appliances 14 may secure communications using a key derived from information contained within the signed certificate.
- Additional information may also be communicated from appliances 14 to clients 12 using the signed certificates.
- the additional information may include a manufacturing attribute of an appliance 14 which may include manufacturer and appliance identification information (e.g., manufacturer identification, model number and/or serial number) of the respective appliance 14 .
- Additional exemplary information which may be included in signed certificates includes physical location information of the appliance 14 (e.g., GPS coordinates, floor or mail stop location information, etc.).
- FIGS. 3-4 methods for providing certification of a provenance of a communications address of an appliance are shown according to exemplary embodiments. Other methods including more, less or alternative steps are possible.
- FIG. 3 illustrates a method for generating verification information according to one embodiment.
- an appliance to be deployed may be manufactured or otherwise provided.
- a trusted association is established between the appliance and a certificate authority.
- the appliance may be deployed including associating the appliance with communications media.
- a communications address of the communications media associated with the appliance may be identified upon the deployment.
- a signed certificate including the communications address of the appliance is created by the certificate authority.
- the appliance announces the signed certificate including the communications address.
- the announcement may be implemented responsive to one or more different triggering event in exemplary embodiments and as described above.
- FIG. 4 an exemplary method is shown for using a signed certificate to implement communications in accordance with one embodiment.
- a client may search an associated communications media for desired services (e.g., provided by one or more of appliances 14 ).
- the client may obtain one or more signed certificate responsive to the searching of step S 30 .
- the client may use the signed certificate to verify the provenance of communications address(es) associated with the appliance.
- an exemplary verification operation includes comparing a communications address extracted from the signed certificate with a sender address from which communication of the signed certificate originated. If verification fails, the method may cease at step S 34 .
- the client obtains data content (e.g., a print job) for communication to the appliance.
- data content e.g., a print job
- the client encrypts the data content for example using a session key in one arrangement. Also, the client may encrypt the communication itself using for example a public key of the appliance.
- the client communicates the encrypted data content to the appliance along with the encrypted session key in at least one embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Communications methods and appliances are described. According to one embodiment, a communications method includes prior to deployment of an appliance, establishing a trusted association between the appliance and a certificate authority, during deployment of the appliance, associating the appliance with a communications address of a communications medium, using the certificate authority, creating a signed certificate including the communications address of the appliance, announcing the signed certificate using the appliance, after the announcing, extracting the communications address of the appliance from the signed certificate, and after the extracting, verifying the communications address of the appliance.
Description
- Aspects of the disclosure relate to communications methods and appliances.
- Over the past several years, there has been an increasing concern about the security of appliances such as disk drives, spoolers, printers, scanners and multi-functional peripherals. The concern is both around the privacy of the data being sent as well concern about whether one is interacting with the intended device or an imposter (i.e., is the printer address the one for the intended printer or a fraudulent address).
- In the past, interception and “man in the middle” attacks were prevented by using 1-1 cables (such as centronix or universal serial bus). However, as appliances moved from being client peripherals to networked resources, the problem emerged of identifying the intended appliance and securing the communication to that appliance.
- In the case of printers, a common approach (seen in many offices) has been to post a label of the printer name with its network address. In this manner, if an individual trusts the label, they could use that address to send a print job to the intended printer. Similar techniques are used for scanners, disk-drives, spoolers and other such appliances.
- There are several problems with the label-based approach. The first is that many deployments-use the dynamic host control protocol (DHCP) and thus the address of the appliance can change over time. This means that while a client might have once had the correct address, the appliance address may change and the client can easily have a mis-directed message. Similarly, an imposter might intentionally mislabel an appliance such as a printer to intercept print jobs in public venues such as coffee shops or airport lounges.
- Some manufacturers provide a user interface on their appliance that will report the address of the appliance on a screen or (in the case of some printers) on a printout. This helps overcome the intentional/accidental mislabeling of a device, but does not address dynamic protocol update or re-configuration of the client devices.
- In addition, the above techniques do not address privacy of the transmitted data and thus eaves-droppers can intercept sensitive documents/material.
- Sensitive documents can be addressed through techniques such as the secure sockets layer (SSL). In this protocol, the client and server agree on a session key that is used to encode messages exchanged between the client and server.
- Other methods include IP Security Protocol (IP-Sec) which replaces the Internet Protocol with a secured packet routing mechanism. IPSec ensures that a message will be delivered only to the destination address but doesn't secure the association of the target with the address (i.e., the mechanism of discovering the correct IP address for the appliance is not addressed by either IP-Sec or SSL).
- An approach to certifying the destination has been to use a challenge in the initial message from the client to the target. The challenge is encrypted with a shared secret or other keying mechanism and only the rightful recipient should be able to answer the challenge and thereby affirm the identity. The issue here is one of key distribution. If the key is shared across a family of appliances, than the imposter can redirect the print job to a second printer and intercept the material. If the key is particular to a printer, then discovering that key is an issue and similar to discovering the printer's IP address noted above.
- Thus there remains a need to discover the provenance of an appliance's address, and/or to communicate with that appliance in a secure manner. At least some aspects of this disclosure are related to improved apparatus and methods for implementing electronic communications between electronic devices such as an appliance and a client in one embodiment.
- According to some aspects, communications methods and appliances are described.
- According to one embodiment, a communications method comprises prior to deployment of an appliance, establishing a trusted association between the appliance and a certificate authority, during deployment of the appliance, associating the appliance with a communications address of a communications medium, using the certificate authority, creating a signed certificate including the communications address of the appliance, announcing the signed certificate using the appliance, after the announcing, extracting the communications address of the appliance from the signed certificate, and verifying the communications address of the appliance.
- According to another embodiment, an appliance comprises a communications interface configured to implement communications of the appliance with respect to a client via a communications medium after deployment of the appliance with respect to the communications medium, wherein the appliance is associated with a communications address of the communications medium upon deployment of the appliance and wherein a trusted association is established between a certificate authority and the appliance prior to deployment of the appliance, and processing circuitry coupled with the communications interface and wherein the processing circuitry is configured to access the communications address, to initiate creation of a signed certificate using the certificate authority and which includes the communications address, and to initiate announcement of the signed certificate including the communications address for use in verification of the communications address of the appliance.
-
FIG. 1 is a functional block diagram of a communications system according to one embodiment. -
FIG. 2 is a functional block diagram of an electronic device appliance according to one embodiment. -
FIG. 3 is a flow chart illustrating an exemplary method for providing a signed certificate according to one embodiment. -
FIG. 4 is a flow chart illustrating an exemplary method for implementing communications according to one embodiment. - Referring to
FIG. 1 , an exemplary configuration of acommunications system 10 is shown. Additional embodiments and aspects are described in a co-pending application entitled “Electronic Device Communication Methods, Appliance Verification Methods, Appliance Programming Methods, Appliances, Articles Of Manufacture, And Client Electronic Devices,” listing Rajesh Krishna Shenoy as inventor, filed the same day as the present application, having attorney docket no. 200312922-1, the teachings of which are incorporated herein by reference. -
Communications system 10 may include one or more electronic device clients (i.e., clients) 12, one or more electronic device appliances (i.e., appliances) 14, one or moreexternal communications device 15, andcommunications media 16. In one example,communications system 10 is embodied as a networked arrangement ofclients 12 configured to use the resources ofappliances 14.Exemplary clients 12 include personal computers, workstations, and other electronic devices configured to implement electronic communications with respect toappliances 14 or other devices.Exemplary appliances 14 may have resources which may be accessed and used byclients 12 and may be embodied as printers, multi-functional peripherals, facsimile machines, scanners, copiers, disk drives, spoolers' or other configurations accessible byclients 12. In one embodiment,appliances 14 may comprise user-accessible devices which are configured to interact with a user during normal operation such as providing data to a user (e.g., provide printed media, copying media, displaying data, capturing data such as images, etc.). Exemplary users may include lay (i.e., non-technical) people as opposed to IT personnel. -
Communications media 16 includes one or more communications medium configured to communicate dataintermediate clients 12 andappliances 14 ofcommunications system 10. For example, one or more communications medium may comprise a communications network which may be embodied as a private and/or public network and may utilize packet-switched TCP/IP communications in one implementation. In more specific examples, communications networks include a zero-configuration network, UPnP based network or an IT-administrated network. A network may include a plurality of nodes such as switches, routers or other devices (i.e., devices not typically accessed by the exemplary above-defined users during normal operations) capable of receiving electronic communications and forwarding the electronic communications to appropriate recipients. - Individual ones of
clients 12 andappliances 14 and other electronic devices configured to communicate usingcommunications media 16 may be individually considered to be associated withcommunications media 16 and may have a respective unique communications address identifying the association and usable bycommunications media 16 and communicating devices to direct communications to appropriate recipients as well as identify a respective sending device of communications. - As described further below,
clients 12 and/orappliances 14 may be configured to communicate verification information and data content using a single communications medium of themedia 16. Exemplary verification information includes a signed certificate usable to verify one or more aspect of a givenclient 12 and/orappliance 14. Exemplary communicated data content may include data perceptible by a user during typical usage and may include email, a print job, a photograph, an electronic file, or other formatted data content convenient for communication between a sending device and a recipient device. In another embodiment, an individual communications medium may be dedicated to implement communications of verification information while another individual different communications medium may be dedicated to implement communications of data content. Other embodiments are possible. - Further, according to additional aspects another
communications medium 17 may be configured to initiate verification operations of aclient 12 and/or anappliance 14 as described further below. For example,communications device 15 is configured to utilize a communications medium 17 (e.g., electromagnetic energy) to implement communications external ofcommunications media 16 in one embodiment.Communications device 15 and one ormore client 12 and/orappliance 14 may be configured to communicate with one another apart fromcommunications media 16.Communications medium 17 includes any appropriate configuration and may provide wired and/or wireless communications. In yet another aspect, verification operations may be initiated using communications ofmedia 16. - Referring to
FIG. 2 , an exemplary configuration of anappliance 14 is shown. The depictedappliance 14 includes acommunications interface 20,processing circuitry 22,storage circuitry 24 and auser interface 26. Other circuitry or components may be provided in other embodiments and corresponding to the respective implementation or configuration of appliance 14 (e.g.,appliance 14 may include a print engine in a printer configuration). In addition,individual clients 12 may be similarly configured asappliance 14 in one arrangement and may individually include a communications interface, processing circuitry, storage circuitry and a user interface as well as any additional components or circuitry applicable to the respective implementation ofclient 12. - In one embodiment, processing
circuitry 22 may comprise circuitry configured to implement desired programming. For example, processingcircuitry 22 may be implemented as a processor and/or other structure configured to execute executable instructions including, for example, software and/or firmware instructions. Other exemplary embodiments of processing circuitry include hardware logic, PGA, FPGA, ASIC, state machines, and/or other structures. These examples of processingcircuitry 22 are for illustration and other configurations are possible.Processing circuitry 22 may formulate communications for external communication, process received communications, implement exemplary secure communications procedures described herein, and/or control and/or monitor other operations of the respective device in one embodiment. In some arrangements, a certificate authority may be embodied or embedded withinappliance 14 andprocessing circuitry 22 may perform certificate authority operations with respect to signing certificates or other operations. -
Storage circuitry 24 is configured to store electronic data and/or programming such as executable instructions (e.g., software and/or firmware), data, or other digital information and may include processor-usable media. Processor-usable media includes any article of manufacture which can contain, store, or maintain programming, data and/or digital information for use by or in connection with an instruction execution system including processing circuitry in the exemplary embodiment. For example, exemplary processor-usable media may include any one of physical media such as electronic, magnetic, optical, electromagnetic, infrared or semiconductor media. Some more specific examples of processor-usable media include, but are not limited to, a portable magnetic computer diskette, such as a floppy diskette, zip disk, hard drive, random access memory, read only memory, flash memory, cache memory, and/or other configurations capable of storing programming, data, or other digital information. As described further below,storage circuitry 24 may be configured to store certificates, keys (e.g., public and private) and other desired information. -
User interface 26 may include a display configured to depict information to a user as well as a keyboard or other input device configured to receive input from a user. - At least some aspects described herein are directed towards implementing communications of increased security intermediate plural devices such as
clients 12 andappliances 14. For example, as described below, exemplary aspects provide verification operations which enable anappropriate client 12 to certify the provenance or authenticity of a communications address of arespective appliance 14. - According to one embodiment, an
individual appliance 14 may be associated, with a certificate authority (CA). In accordance with the described embodiment, a trusted association is established between theappliance 14 and the certificate authority to provide verification operations, such as certification of the provenance of the communications address of theappliance 14, at a later moment in time. The trusted association may be established via a unique secret (e.g., prime number) shared between theappliance 14 and the certificate authority in one arrangement. In another arrangement, the certificate authority may be physically associated with appliance 14 (e.g., embodied or embedded internally ofappliance 14 as mentioned above) to establish the trusted relationship, or the trusted relationship may be provided in any other appropriate manner. A source (e.g., manufacturer) ofappliances 14 may have a trusted relationship with a certificate authority and through the relationship the source is able to produce serial numbers ofindividual appliances 14 which illustrate that therespective appliances 14 were trusted by the source and the source was trusted by the certificate authority (i.e.,appliances 14 were authentically manufactured by the source also referred to as non-repudiation). - After manufacture, an
appliance 14 may be deployed for operation. For example, during deployment, anappliance 14 may be associated with communications medium 16 to interact withclients 12 and perhapsother appliances 14. During the association, a communications address of thecommunications medium 16 may be assigned to therespective appliance 14. Thereafter, communications may be implemented between theappliance 14 andcommunications medium 16 using the communications address. Exemplary aspects are described below enabling the certification of the provenance of the communications address of theappliance 14 to provide communicationsintermediate clients 12 and theappliance 14. According to some aspects, a plurality of communications addresses may be associated with anindividual appliance 14. For example, the addresses may be respectively used at appropriate moments in time (e.g., communications occur inside or outside of a firewall, etc.). The plurality of communications addresses may be provided within a signed certificate for announcement byappliance 14 described further below. - The certificate authority may create a signed certificate which includes the communications address(es) associated with the
appliance 14. After creation, the signed certificate may be stored internally of therespective appliance 14 in one embodiment. -
Appliances 14 individually make their respective communications addresses available toclients 12 and perhaps other devices of thecommunications system 10 using respective signed certificates according to some aspects.Appliances 14 may announce respective signed certificates responsive to detection of an action such as one or more triggering event. In one example,external communications device 15 may be configured to initiate verification operations performed by one ormore appliance 14 to provide the triggering event. In a more specific exemplary embodiment,device 15 may emit an external communication (e.g., according to a Bluetooth protocol) which when received by anappliance 14 initiates the receivingappliance 14 to output the signed certificate which may be utilized to certify the provenance of the communications address of theappliance 14 as described in further detail below. For example,client 12,appliance 14 and/orcommunications device 15 may provide proximity reader communications to initiate the communications of the signed certificate. - In yet another possible embodiment, communications from
external communications device 15 to initiate verification operations may be communicated usingcommunications media 16. In another embodiment, a user may access a user input ofuser interface 26 at an appropriate moment in time to initiate the outputting of the signed certificate from theappliance 14. In another implementation,processing circuitry 22 ofappliance 14 may monitor time intervals and initiate the communication of the signed certificate following the detection of an action including an elapse of a predetermined period of time (e.g., to provide periodic communications of the signed certificate). Other triggering events may be used in other aspects. - As described above according to exemplary embodiments,
appliances 14 announce the signed certificates including outputting internally stored signed certificates. In some embodiments, announcement of the signed certificates may be independently initiated byappliances 14 or responsive to external stimulus. In additional embodiments,appliances 14 may encode or encrypt signed certificates prior to announcement of the certificates for subsequent decoding or decryption byclients 12. - In one communications example mentioned above,
communications media 16 may comprise a first communications medium for communications of data content and a second communications medium for communications of the signed certificates. A medium comprising a networking protocol may be used for communicating the signed certificates wherein the certificates can individually be sent to multiple participants (e.g., clients 12) during a single announcement.Clients 12 may listen on the medium comprising a multicast channel for the signed certificates according to the presently described example and thereafter utilize the first communications medium to provide communications of data content if the provenance of the communications address of therespective appliance 14 is certified. -
Clients 12 may access the announced signed certificates to certify the provenance of the communications addresses of theappliances 14. In some arrangements,clients 12 are individually configured to search for the presence of the announced signed certificates. The announcements may individually include an appropriate identifier which indicates toclients 12 that a signed certificate is contained therein. Other embodiments are possible to provide for the communication of the signed certificates fromappliances 14 toclients 12. -
Clients 12 receiving signed certificates are arranged to verify verification information (e.g., communications address of appliance(s) 14) contained therein. In a first aspect,clients 12 verify the signed certificates themselves and thereafter verify the communications address(es) contained within the signed certificate(s). In one embodiment,clients 12 identify the signing entities of the source certificates (e.g., the respective certificate authorities). Therespective appliances 14 may be verified as authentic if the signing entities of the signed certificates are proper (e.g., proper certificate authorities). Provenances of the communications addresses from selected ones of theappliances 14 may be rejected if the respective signing entities of the certificates are not proper. - Also according to the described embodiment,
clients 12 extract communications addresses from the signed certificates. Theclients 12 may also access information regarding respective sender addresses regarding the entities which announced the signed certificates (i.e., appliances 14). In one verification embodiment,clients 12 are configured to compare the communications addresses extracted from the signed certificates with respective ones of the sender addresses order to certify the provenances of the respective communications addresses. If verification is proper,clients 12 may implement communications with respect to verified ones of theappliances 14. If verification is not proper (e.g., certificates or signing entities not proper, or addresses do not match),clients 12 may disable any communications with respect to theappliances 14 and may also inform a network administrator or other appropriate personnel. - Once verification is completed, encrypted communications between
clients 12 and verifiedappliances 14 may occur using the communications address extracted from the signed certificate. In one embodiment, aclient 12 may create a session key and encode (e.g., encrypt) data content to be communicated (e.g., print job) using the session key. In one example, aclient 12 may encrypt the session key with an appliance public key received in a signed certificate, attach the encrypted session key to the beginning of an encrypted message including data content, and communicate the encrypted message toappliance 14. Accordingly, in one embodiment,clients 12 andappliances 14 may secure communications using a key derived from information contained within the signed certificate. - Additional information may also be communicated from
appliances 14 toclients 12 using the signed certificates. In one exemplary embodiment, the additional information may include a manufacturing attribute of anappliance 14 which may include manufacturer and appliance identification information (e.g., manufacturer identification, model number and/or serial number) of therespective appliance 14. Additional exemplary information which may be included in signed certificates includes physical location information of the appliance 14 (e.g., GPS coordinates, floor or mail stop location information, etc.). - Referring to
FIGS. 3-4 , methods for providing certification of a provenance of a communications address of an appliance are shown according to exemplary embodiments. Other methods including more, less or alternative steps are possible. -
FIG. 3 illustrates a method for generating verification information according to one embodiment. - Initially, at a step S10, an appliance to be deployed may be manufactured or otherwise provided.
- At a step S12, a trusted association is established between the appliance and a certificate authority.
- At a step S14, the appliance may be deployed including associating the appliance with communications media.
- At a step S16, a communications address of the communications media associated with the appliance may be identified upon the deployment.
- At a step S18, a signed certificate including the communications address of the appliance is created by the certificate authority.
- At a step S20, the appliance announces the signed certificate including the communications address. The announcement may be implemented responsive to one or more different triggering event in exemplary embodiments and as described above.
- Referring to
FIG. 4 , an exemplary method is shown for using a signed certificate to implement communications in accordance with one embodiment. - At a step S30, a client may search an associated communications media for desired services (e.g., provided by one or more of appliances 14).
- At a step S32, the client may obtain one or more signed certificate responsive to the searching of step S30.
- At a step S34, the client may use the signed certificate to verify the provenance of communications address(es) associated with the appliance. As described above, an exemplary verification operation includes comparing a communications address extracted from the signed certificate with a sender address from which communication of the signed certificate originated. If verification fails, the method may cease at step S34.
- At a step S36, if verification is proper, the client obtains data content (e.g., a print job) for communication to the appliance.
- At a step S38, the client encrypts the data content for example using a session key in one arrangement. Also, the client may encrypt the communication itself using for example a public key of the appliance.
- At a step S40, the client communicates the encrypted data content to the appliance along with the encrypted session key in at least one embodiment.
- The protection sought is not to be limited to the disclosed embodiments, which are given by way of example only, but instead is to be limited only by the scope of the appended claims.
Claims (21)
1-33. (canceled)
34. A communications method comprising:
accessing verification information comprising an identifier certificate that includes an electronic address corresponding to an association of an appliance with a communications media;
accessing an electronic address of the appliance apart from the identifier certificate;
verifying the electronic address using the identifier certificate and the electronic address accessed apart from the identifier certificate;
encrypting data for communication to the appliance responsive to verification of the electronic address; and
communicating the encrypted data to the communications media.
35. The communications method according to claim 34 , wherein verifying the electronic address further comprises:
comparing the electronic address accessed from the identifier certificate with the electronic address accessed apart from the identifier certificate.
36. The communications method according to claim 34 , further comprising:
disabling communications with respect to the appliance in response to a determination that the verification information is improper.
37. The communications method according to claim 36 , further comprising:
outputting an indication that the verification information is improper.
38. The communications method according to claim 34 , further comprising:
verifying a source of the appliance using the verification information.
39. The communications method according to claim 34 , further comprising:
creating a session key;
encoding data to be communicated using the session key; and
wherein communicating the encrypted data further comprises communicating the encoded data.
40. The communications method according to claim 39 , wherein the verification information includes an appliance public key, said method further comprising:
encrypting the session key using the appliance public key;
attaching the encrypted session key to a beginning of an encrypted message including the encoded data; and
wherein communicating the encrypted data further comprises communicating the encoded message.
41. The communications method according to claim 34 , wherein the verification information further includes at least one of a manufacturing attribute of the appliance and physical location information of the appliance.
42. The communications method according to claim 34 , wherein accessing the verification information further comprises accessing the verification information from the appliance, and wherein the identifier certificate is created using a certificate authority.
43. A device comprising:
a memory on which is stored machine readable instructions to cause a processor to:
access verification information including an identifier certificate that includes an electronic address corresponding to an association of an appliance with a communications media;
access an electronic address of the appliance apart from the identifier certificate;
verify the electronic address of the appliance accessed apart from the identifier certificate using the electronic address included in the identifier certificate;
encrypt data for communication to the appliance responsive to verification of the electronic address accessed apart from the identifier certificate; and
communicate the encrypted data to the communications media; and
a processor to implement the machine readable instructions.
44. The device according to claim 43 , wherein, to verify the electronic address, the machine readable instructions are further to cause the processor to:
compare the electronic address accessed from the identifier certificate with the electronic address accessed apart from the identifier certificate.
45. The device according to claim 43 , wherein the machine readable instructions are further to cause the processor to:
disable communications with respect to the appliance in response to a determination that the verification information is improper.
46. The device according to claim 45 , wherein the machine readable instructions are further to cause the processor to:
output an indication that the verification information is improper.
47. The device according to claim 43 , wherein the machine readable instructions are further to cause the processor to:
verify a source of the appliance using the verification information.
48. The device according to claim 43 , wherein the machine readable instructions are further to cause the processor to:
create a session key;
encode data to be communicated using the session key; and
wherein, to communicate the encrypted data, the machine readable instructions are further to cause the processor to communicate the encoded data.
49. The device according to claim 43 , wherein the verification information includes an appliance public key, and wherein the machine readable instructions are further to cause the processor to:
encrypt the session key using the appliance public key;
attach the encrypted session key to a beginning of an encrypted message including the encoded data; and
wherein, to communicate the encrypted data, the machine readable instructions are further to cause the processor to communicate the encoded message.
50. The device according to claim 43 , wherein the machine readable instructions are further to cause the processor to:
access the verification information from the appliance, and wherein the identifier certificate is created using a certificate authority.
51. A non-transitory computer readable medium on which is stored machine readable instructions that when executed by a processor cause the processor to:
access verification information including an identifier certificate that includes an electronic address corresponding to an association of an appliance with a communications media;
access an electronic address of the appliance apart from the identifier certificate;
verify the electronic address of the appliance accessed apart from the identifier certificate using the electronic address included in the identifier certificate;
encrypt data for communication to the appliance responsive to verification of the electronic address accessed apart from the identifier certificate; and
communicate the encrypted data to the communications media.
52. The non-transitory computer readable medium according to claim 51 , wherein the verification information includes an appliance public key, and wherein the machine readable instructions are further to cause the processor to:
create a session key;
encode data to be communicated using the session key;
encrypt the session key using the appliance public key;
attach the encrypted session key to a beginning of an encrypted message including the encoded data; and
wherein, to communicate the encrypted data, the machine readable instructions are further to cause the processor to communicate the encoded message.
53. The non-transitory computer readable medium according to claim 52 , wherein the machine readable instructions are further to cause the processor to:
access the verification information from the appliance, and wherein the identifier certificate is created using a certificate authority.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/762,187 US9894048B2 (en) | 2004-09-30 | 2013-02-07 | Communications methods and appliances |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/957,490 US8375202B2 (en) | 2004-09-30 | 2004-09-30 | Communications methods and appliances |
US13/762,187 US9894048B2 (en) | 2004-09-30 | 2013-02-07 | Communications methods and appliances |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/957,490 Division US8375202B2 (en) | 2004-09-30 | 2004-09-30 | Communications methods and appliances |
Publications (2)
Publication Number | Publication Date |
---|---|
US20130160090A1 true US20130160090A1 (en) | 2013-06-20 |
US9894048B2 US9894048B2 (en) | 2018-02-13 |
Family
ID=36127030
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/957,490 Active 2032-08-25 US8375202B2 (en) | 2004-09-30 | 2004-09-30 | Communications methods and appliances |
US13/762,187 Active 2025-09-25 US9894048B2 (en) | 2004-09-30 | 2013-02-07 | Communications methods and appliances |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/957,490 Active 2032-08-25 US8375202B2 (en) | 2004-09-30 | 2004-09-30 | Communications methods and appliances |
Country Status (1)
Country | Link |
---|---|
US (2) | US8375202B2 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4449931B2 (en) | 2006-03-30 | 2010-04-14 | ブラザー工業株式会社 | Management device and management system |
US9455837B2 (en) * | 2010-12-28 | 2016-09-27 | Konica Minolta Laboratory U.S.A., Inc. | Method and system for exchange multifunction job security using IPV6 neighbor discovery options |
US9161249B1 (en) * | 2011-07-07 | 2015-10-13 | Symantec Corporation | Systems and methods for performing internet site security analyses |
US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
WO2015128895A1 (en) * | 2014-02-26 | 2015-09-03 | 三菱電機株式会社 | Certificate management apparatus and certificate management method |
US10263968B1 (en) * | 2015-07-24 | 2019-04-16 | Hologic Inc. | Security measure for exchanging keys over networks |
CN109657170B (en) * | 2018-10-17 | 2023-02-10 | 平安普惠企业管理有限公司 | Webpage loading method and device, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6314521B1 (en) * | 1997-11-26 | 2001-11-06 | International Business Machines Corporation | Secure configuration of a digital certificate for a printer or other network device |
US20020080959A1 (en) * | 2000-12-27 | 2002-06-27 | Xerox Corporation | Automatic authentication of printed documents |
US20030105963A1 (en) * | 2001-12-05 | 2003-06-05 | Slick Royce E. | Secure printing with authenticated printer key |
US20050188193A1 (en) * | 2004-02-20 | 2005-08-25 | Microsoft Corporation | Secure network channel |
WO2008030523A2 (en) * | 2006-09-06 | 2008-03-13 | Bsecured Solutions, Llc | Real privacy management authentication system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003093942A2 (en) * | 2002-05-01 | 2003-11-13 | Bruce Eric Ross | System for configuring client computers to a secure host using smart cards |
-
2004
- 2004-09-30 US US10/957,490 patent/US8375202B2/en active Active
-
2013
- 2013-02-07 US US13/762,187 patent/US9894048B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6314521B1 (en) * | 1997-11-26 | 2001-11-06 | International Business Machines Corporation | Secure configuration of a digital certificate for a printer or other network device |
US20020080959A1 (en) * | 2000-12-27 | 2002-06-27 | Xerox Corporation | Automatic authentication of printed documents |
US20030105963A1 (en) * | 2001-12-05 | 2003-06-05 | Slick Royce E. | Secure printing with authenticated printer key |
US20050188193A1 (en) * | 2004-02-20 | 2005-08-25 | Microsoft Corporation | Secure network channel |
WO2008030523A2 (en) * | 2006-09-06 | 2008-03-13 | Bsecured Solutions, Llc | Real privacy management authentication system |
Non-Patent Citations (1)
Title |
---|
Chin-Tser Huang, John H. Gerdes, Jr.; "Privacy-preserving multi-dimensional credentialing using veiled certificates"; April 2009; CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies; Publisher: ACM; pp. 1-14 * |
Also Published As
Publication number | Publication date |
---|---|
US9894048B2 (en) | 2018-02-13 |
US8375202B2 (en) | 2013-02-12 |
US20060075221A1 (en) | 2006-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9894048B2 (en) | Communications methods and appliances | |
US10904758B2 (en) | Secure method for configuring internet of things (IOT) devices through wireless technologies | |
JP4599852B2 (en) | Data communication apparatus and method, and program | |
US7792993B1 (en) | Apparatus and methods for allocating addresses in a network | |
JP5792732B2 (en) | Modular device authentication framework | |
AU2013101722A4 (en) | Data security management system | |
US20030217148A1 (en) | Method and apparatus for LAN authentication on switch | |
US6938154B1 (en) | System, method and article of manufacture for a cryptographic key infrastructure for networked devices | |
US8601267B2 (en) | Establishing a secured communication session | |
US20210195417A1 (en) | Methods and Apparatus for Securely Storing, Using and/or Updating Credentials Using a Network Device at a Customer Premises | |
US8856525B2 (en) | Authentication of email servers and personal computers | |
JP2005269656A (en) | Efficient and secure authentication of computing system | |
CN103067337B (en) | Identity federation method, identity federation intrusion detection & prevention system (IdP), identity federation service provider (SP) and identity federation system | |
CN104836784B (en) | A kind of information processing method, client and server | |
CN111737723B (en) | Service processing method, device and equipment | |
JP2001186122A (en) | Authentication system and authentication method | |
CN101145915A (en) | A trusted router authentication system and method | |
CN113647051B (en) | System and method for secure electronic data transmission | |
JP2006072970A (en) | Information processing method and device | |
CN111314269A (en) | Address automatic allocation protocol security authentication method and equipment | |
JP3563649B2 (en) | Communication control device and recording medium | |
JP2009245075A (en) | Data-providing system and communication device | |
US20060075477A1 (en) | Electronic device communication methods, appliance verification methods, appliance programming methods, appliances, articles of manufacture, and client electronic devices | |
WO2012116633A1 (en) | Authentication method based on dhcp, dhcp server and client | |
US20070106910A1 (en) | Device management system, device management method, computer program, and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:037079/0001 Effective date: 20151027 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |